• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Network time protocol (version 3): Specification, implementation and analysis (1992)

by David L Mills
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 521
Next 10 →

Measurements and analysis of end-to-end Internet dynamics

by Vern Paxson , 1997
"... ..."
Abstract - Cited by 411 (7 self) - Add to MetaCart
Abstract not found

Multicast-Based Inference of Network-Internal Characteristics: Accuracy of Packet Loss Estimation

by R. Caceres, N.G. Duffield, J. Horowitz, D. Towsley, T. Bu - IEEE Transactions on Information Theory , 1998
"... We explore the use of end-to-end multicast traffic as measurement probes to infer network-internal characteristics. We have developed in an earlier paper [2] a Maximum Likelihood Estimator for packet loss rates on individual links based on losses observed by multicast receivers. This technique explo ..."
Abstract - Cited by 323 (40 self) - Add to MetaCart
We explore the use of end-to-end multicast traffic as measurement probes to infer network-internal characteristics. We have developed in an earlier paper [2] a Maximum Likelihood Estimator for packet loss rates on individual links based on losses observed by multicast receivers. This technique exploits the inherent correlation between such observations to infer the performance of paths between branch points in the multicast tree spanning the probe source and its receivers. We evaluate through analysis and simulation the accuracy of our estimator under a variety of network conditions. In particular, we report on the error between inferred loss rates and actual loss rates as we vary the network topology, propagation delay, packet drop policy, background traffic mix, and probe traffic type. In all but one case, estimated losses and probe losses agree to within 2 percent on average. We feel this accuracy is enough to reliably identify congested links in a wide-area internetwork. Keywords---Internet performance, end-to-end measurements, Maximum Likelihood Estimator, tomography I.
(Show Context)

Citation Context

...chronization to within tenths of microseconds; it is currently used or planned in several of the measurement infrastructures mentioned earlier. More widely deployed is the Network Time Protocol (NTP) =-=[20]-=-. However, this provides accuracy only on the order of milliseconds at best, a resolution at least as coarse as the queueing delays in practice. Alternative approaches that can supplement delay measur...

Advanced and Authenticated Marking Schemes for IP Traceback

by Dawn Xiaodong Song, Adrian Perrig - IN: PROCEEDINGS OF IEEE INFOCOM CONFERENCE , 2000
"... Defending against distributed denial-of-service attacks is one of the hardest security problems on the Internet today. One difficulty to thwart these attacks is to trace the sourec of the attacks because they often use incorrect, or spoofed IP source addresses to disguide the true origin. In this pa ..."
Abstract - Cited by 316 (7 self) - Add to MetaCart
Defending against distributed denial-of-service attacks is one of the hardest security problems on the Internet today. One difficulty to thwart these attacks is to trace the sourec of the attacks because they often use incorrect, or spoofed IP source addresses to disguide the true origin. In this paper, we present two new schemes, the Advanced Marking Scheme and the Authenticated Marking Scheme, which allow the victim to traceback the approcimate origin of the spoofed Ip packets. Our techniques feature low network and router overhead, and support incremental deployment. In contrast to previous work, our techniques have significantly higher precision (lower false positive rate) and lower computation overhead for the victim to reconstruct the attack paths under large scale distributed denial-of-service attacks. Furthermore the Authenticaed Marking Scheme provides efficient authentication of routers' markings such that even a compromised router cannot forge or tamper markings from other uncompromised routers.

Efficient and Secure Source Authentication for Multicast

by Adrian Perrig, Ran Canetti, Dawn Song, J. D. Tygar - In Network and Distributed System Security Symposium, NDSS ’01 , 2001
"... One of the main challenges of securing multicast communication is source authentication, or enabling receivers of multicast data to verify that the received data originated with the claimed source and was not modified enroute. The problem becomes more complex in common settings where other receivers ..."
Abstract - Cited by 273 (8 self) - Add to MetaCart
One of the main challenges of securing multicast communication is source authentication, or enabling receivers of multicast data to verify that the received data originated with the claimed source and was not modified enroute. The problem becomes more complex in common settings where other receivers of the data are not trusted, and where lost packets are not retransmitted.

SDP: session description protocol

by M. Handley, V. Jacobson, C. Perkins , 1998
"... This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this pro ..."
Abstract - Cited by 186 (1 self) - Add to MetaCart
This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). This memo defines the Session Description Protocol (SDP). SDP is intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation.
(Show Context)

Citation Context

...e identifier for the session. The method of <sess-id> allocation is up to the creating tool, but it has been suggested that a Network Time Protocol (NTP) format timestamp be used to ensure uniqueness =-=[13]-=-. <sess-version> is a version number for this session description. Its usage is up to the creating tool, so long as <sess-version> is increased when a modification is made to the session data. Again, ...

Improved Algorithms for Synchronizing Computer Network Clocks

by David L. Mills - IEEE/ACM Transactions on Networking , 1995
"... The Network Time Protocol (NTP) is widely deployed in the Internet to synchronize computer clocks to each other and to international standards via telephone modem, radio and satellite. The protocols and algorithms have evolved over more than a decade to produce the present NTP Version 3 specificatio ..."
Abstract - Cited by 180 (10 self) - Add to MetaCart
The Network Time Protocol (NTP) is widely deployed in the Internet to synchronize computer clocks to each other and to international standards via telephone modem, radio and satellite. The protocols and algorithms have evolved over more than a decade to produce the present NTP Version 3 specification and implementations. Most of the estimated deployment of 100,000 NTP servers and clients enjoy synchronization to within a few tens of milliseconds in the Internet of today. This paper describes specific improvements developed for NTP Version 3 which have resulted in increased accuracy, stability and reliability in both local-area and wide-area networks. These include engineered refinements of several algorithms used to measure time differences between a local clock and a number of peer clocks in the network, as well as to select the best ensemble from among a set of peer clocks and combine their differences to produce a clock accuracy better than any in the ensemble. This paper also describes engineered refinements of the algorithms used to adjust the time and frequency of the local clock, which functions as a disciplined oscillator. The refinements provide automatic adjustment of message-exchange intervals in order to minimize network traffic between clients and busy servers while maintaining the best accuracy. Finally, this paper describes certain enhancements to the Unix operating system software in order to realize submillisecond accuracies with fast workstations and networks.
(Show Context)

Citation Context

...ms used in NTP. A detailed description of the architecture and service model is contained in [MIL91], while the current protocol formal specification, designated NTP Version 3, is defined in RFC-1305 =-=[MIL92a]-=-. A subset of the protocol, designated Simple Network Time Protocol (SNTP), is presented in RFC1361 [MIL92c]. A security analysis of NTP is presented in [BIS90]. NTP and its implementations have evolv...

Clock synchronization for wireless sensor networks: A Survey

by Bharath Sundararaman, Ugo Buy, Ajay D. Kshemkalyani - Ad Hoc Networks (Elsevier , 2005
"... ..."
Abstract - Cited by 178 (2 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...be considered in this paper. 2.3. Clock inaccuracies We require the following definitions. For any two clocks C a and C b, Fig. 1 gives our terminology, which is consistent with previous definitions =-=[46,47,50]-=-. The term software clock normally refers to the time in a computer clock to stress that it is just a counter that gets incremented for crystal oscillations. The interrupt handler must increment the s...

Enhancements to the RADAR User Location and Tracking System

by Paramvir Bahl, Venkata N. Padmanabhan, Anand Balachandran , 2000
"... We address the problem of locating users inside buildings using a radio-frequency (RF) wireless LAN. A previous paper presented the basic design and a limited evaluation of a user-location system we have developed. In this paper, we analyze shortcomings of the basic system, and develop and evaluate ..."
Abstract - Cited by 165 (2 self) - Add to MetaCart
We address the problem of locating users inside buildings using a radio-frequency (RF) wireless LAN. A previous paper presented the basic design and a limited evaluation of a user-location system we have developed. In this paper, we analyze shortcomings of the basic system, and develop and evaluate solutions to address these shortcomings. Additionally, we describe several new enhancements, including a novel access point-based environmental profiling scheme, and a Viterbi-like algorithm for continuous user tracking and disambiguation of candidate user locations. Using extensive data collected from our deployment, we evaluate our system&apos;s performance over multiple wireless LAN technologies and in different buildings on our campus. We also discuss significant practical issues that arise in implementing such a system. Our techniques are implemented purely in software and are easily deployable over a standard wireless LAN.

Remote physical device fingerprinting

by Tadayoshi Kohno, et al.
"... We introduce the area of remote physical device fingerprinting, or fingerprinting a physical device, as opposed to an operating system or class of devices, remotely, and without the fingerprinted device’s known cooperation. We accomplish this goal by exploiting small, microscopic deviations in devic ..."
Abstract - Cited by 154 (7 self) - Add to MetaCart
We introduce the area of remote physical device fingerprinting, or fingerprinting a physical device, as opposed to an operating system or class of devices, remotely, and without the fingerprinted device’s known cooperation. We accomplish this goal by exploiting small, microscopic deviations in device hardware: clock skews. Our techniques do not require any modification to the fingerprinted devices. Our techniques report consistent measurements when the measurer is thousands of miles, multiple hops, and tens of milliseconds away from the fingerprinted device, and when the fingerprinted device is connected to the Internet from different locations and via different access technologies. Further, one can apply our passive and semi-passive techniques when the fingerprinted device is behind a NAT or firewall, and also when the device’s system time is maintained via NTP or SNTP. One can use our techniques to obtain information about whether two devices on the Internet, possibly shifted in time or IP addresses, are actually the same physical device. Example applications include: computer forensics; tracking, with some probability, a physical device as it connects to the Internet from different public access points; counting the number of devices behind a NAT even when the devices use constant or random IP IDs; remotely probing a block of addresses to determine if the addresses correspond to virtual hosts, e.g., as part of a virtual honeynet; and unanonymizing anonymized network traces.
(Show Context)

Citation Context

...different access technologies. One can apply our passive and semi-passive techniques when the fingerprinted device is behind a NAT or firewall, and when the device’s system time is maintained via NTP =-=[26]-=- or SNTP [25]. One can use our techniques to obtain information about whether two devices on the Internet (possibly shifted in time or IP addresses) are actually the same physical device. One applicat...

On Calibrating Measurements of Packet Transit Times

by Vern Paxson - In Proceedings of ACM SIGMETRICS , 1998
"... We discuss the problem of detecting errors in measurements of the total delay experienced by packets transmitted through a wide-area network. We assume that we have measurements of the transmission times of a group of packets sent from an originating host, A, and a corresponding set of measurements ..."
Abstract - Cited by 138 (6 self) - Add to MetaCart
We discuss the problem of detecting errors in measurements of the total delay experienced by packets transmitted through a wide-area network. We assume that we have measurements of the transmission times of a group of packets sent from an originating host, A, and a corresponding set of measurements of their arrival times at their destination host, B, recorded by two separate clocks. We also assume that we have a similar series of measurements of packets sent from B to A (as might occur when recording a TCP connection), but we do not assume that the clock at A is synchronized with the clock at B, nor that they run at the same frequency. We develop robust algorithms for detecting abrupt adjustments to either clock, and for estimating the relative skew between the clocks. By analyzing a large set of measurements of Internet TCP connections, we find that both clock adjustments and relative skew are sufficiently common that failing to detect them can lead to potentially large errors when an...
(Show Context)

Citation Context

... are free of relative errors. 2 Basic clock terminology In this section we define basic terminology for discussing the characteristics of the clocks used in our study. The Network Time Protocol (NTP; =-=[Mi92a]-=-) defines a nomenclature for discussing clock characteristics, which we will use as appropriate. It is important to note, however, that the main goal of NTP is to provide accurate timekeeping over fai...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University